=====================================
Douglas White
group Manager
mailto:[EMAIL PROTECTED]
http://www.samcfug.org
=====================================
----- Original Message -----
From: "Postmaster" <[EMAIL PROTECTED]>
To: <[EMAIL PROTECTED]>
Sent: Sunday, January 26, 2003 3:28 PM
Subject: Undeliverable Mail


| Delivery failed 25 attempts: [EMAIL PROTECTED]
|
|
| Original message follows.
|
| Received: from lake [66.139.91.38] by samcfug.org with ESMTP
|   (SMTPD32-7.13) id AE2C77014E; Sun, 26 Jan 2003 09:26:36 -0600
| Message-ID: <014e01c2c54f$65732b50$265b8b42@lake>
| From: "samcfug" <[EMAIL PROTECTED]>
| To: <[EMAIL PROTECTED]>
| References: <MDAEMON-F200301260126_AA260374MD81238@areaindex_com>
| Subject: Re: SQL Worm
| Date: Sun, 26 Jan 2003 09:27:11 -0600
| MIME-Version: 1.0
| Content-Type: text/plain;
| charset="iso-8859-1"
| Content-Transfer-Encoding: 7bit
| X-Priority: 3
| X-MSMail-Priority: Normal
| X-Mailer: Microsoft Outlook Express 6.00.2800.1106
| X-MIMEOLE: Produced By Microsoft MimeOLE V6.00.2800.1106
|
| You are correct in suggesting that any computer user should become familiar
with
| Security.   A quick reference to CERT will inform the reader that MS products
| have no more vulnerabilities than any other operating system.  A responsible
| admin will keep their systems up to date.  The very fact that there are so
many
| systems being brought to their knees, is proof positive that many very mission
| critical and high profile users are not bothering to do this, for whatever the
| reason.  My Linux servers have been receiving as many as three security
updates
| per week, of late.
|
| On the other hand, calling every user who runs SQL databases or MSDE on the
net
| irresponsible, is way off the mark.  There are thousands of SQL servers that
are
| not being affected by this attack, mine being among those not affected.
There
| are several things an admin can do to protect themselves, the simplest, of
| course is to stay abreast of security and system upgrades and patches.  One
| extra thing is that on my SQL server, when setting up the DSN I tend to use
| unique port numbers instead of the default ports of 1433-1434 and this attack
| and prior ones that target SQL servers have never gotten in to begin with.  My
| firewall solidly blocks the default ports.  The admins that have secured their
| systems are doing a great job for their customers.
|
| I host over 60 web sites that use SQL2000, and not one of them have missed a
|
| [message truncated]
|

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~|
Archives: http://www.houseoffusion.com/cf_lists/index.cfm?forumid=4
Subscription: 
http://www.houseoffusion.com/cf_lists/index.cfm?method=subscribe&forumid=4
FAQ: http://www.thenetprofits.co.uk/coldfusion/faq
Get the mailserver that powers this list at http://www.coolfusion.com

                                Unsubscribe: 
http://www.houseoffusion.com/cf_lists/unsubscribe.cfm?user=89.70.4
                                

Reply via email to